/openssl/test/recipes/80-test_cmp_http_data/ |
H A D | test_verification.csv | 12 1,config default with expected sender, -section,, -recipient,_CA_DN, -expect_sender,_SERVER_DN,BLAN… 13 0,expected sender missing arg, -section,, -recipient,_CA_DN, -expect_sender,,BLANK,, -trusted,trust… 14 0,wrong expected sender, -section,, -recipient,_CA_DN, -expect_sender,/CN=Sample Cert/OU=R&D/O=Comp… 15 1,unknown attribute in expected sender, -section,, -recipient,_CA_DN, -expect_sender,_SERVER_DN/ABC… 16 0,extra attribute in expected sender, -section,, -recipient,_CA_DN, -expect_sender,_SERVER_DN/seria… 17 0,double attribute in expected sender, -section,, -recipient,_CA_DN, -expect_sender,/CN=ECC Issuing… 18 0,missing attribute in expected sender, -section,, -recipient,_CA_DN, -expect_sender,/CN=ECC Issuin… 19 0,bad syntax in expected sender name: leading double '/', -section,, -recipient,_CA_DN, -expect_sen… 20 0,bad syntax in expected sender name: trailing double '/', -section,, -recipient,_CA_DN, -expect_se… 21 0,bad syntax in expected sender name: missing '=', -section,, -recipient,_CA_DN, -expect_sender,/C=… [all …]
|
/openssl/test/ |
H A D | cmp_hdr_test.c | 75 X509_NAME *sender = X509_NAME_new(); in execute_HDR_get0_senderNonce_test() local 78 if (!TEST_ptr(sender)) in execute_HDR_get0_senderNonce_test() 81 X509_NAME_ADD(sender, "CN", "A common sender name"); in execute_HDR_get0_senderNonce_test() 82 if (!TEST_int_eq(OSSL_CMP_CTX_set1_subjectName(fixture->cmp_ctx, sender), in execute_HDR_get0_senderNonce_test() 95 X509_NAME_free(sender); in execute_HDR_get0_senderNonce_test() 120 if (!TEST_int_eq(fixture->hdr->sender->type, GEN_DIRNAME)) in execute_HDR_set1_sender_test() 123 if (!TEST_int_eq(X509_NAME_cmp(fixture->hdr->sender->d.directoryName, in execute_HDR_set1_sender_test()
|
/openssl/doc/internal/man3/ |
H A D | ossl_cmp_hdr_init.pod | 62 ossl_cmp_hdr_get0_sendernonce() returns the sender nonce of the given PKIHeader. 67 ossl_cmp_hdr_set1_sender() sets the sender field in the given PKIHeader 76 The messageTime field contains the time at which the sender created the message. 82 else the subject key ID of the sender's protecting certificate. 110 The sender name is copied from the subject of the client cert, if any, 112 As required by RFC 4210 section 5.1.1., if the sender name is not known
|
H A D | ossl_cmp_msg_check_update.pod | 30 =item its sender is of appropriate type (currently only B<X509_NAME>) 31 and matches any expected sender or srvCert subject given in B<ctx>,
|
/openssl/doc/man3/ |
H A D | OSSL_HPKE_CTX_new.pod | 93 (AEAD) algorithm, with optional sender authentication. 95 The sender and a receiver here will generally be using some application or 97 the sender will be a browser and the receiver will be a web server. 106 the sender and receiver. Attempting to use a single context for both will 175 Authenticates possession of a KEM-based sender private key. 190 HPKE contexts have a role - either sender or receiver. This is used 248 A sender's goal is to use HPKE to encrypt using a public key, via use of a 253 encapsulation step, the sender can then make one or more calls to 312 OSSL_HPKE_decap() takes as input the sender's encapsulated public value 351 HPKE defines modes that support KEM-based sender-authentication [all …]
|
H A D | OSSL_CMP_validate_msg.pod | 19 which includes validating CMP message sender certificates and their paths 30 If no such sender cert has been pinned then candidate sender certificates are 37 the I<msg> sender DN (as far as present), and its subject key identifier
|
H A D | OSSL_CMP_CTX_new.pod | 456 and as default value for the expected sender of CMP responses. 459 expected in the sender field of incoming CMP messages. 466 expected sender name will continue to match after updates of the server cert. 502 The subject of this I<cert> will be used as the sender field of outgoing 539 According to RFC 4210 section 5.1.1, if no value for the sender field in 542 then the sender field will contain the NULL-DN 596 The I<subjectName> is also used as fallback for the sender field 631 The subject of the reference certificate is used as the sender field value 747 OSSL_CMP_CTX_set1_senderNonce() stores the last sent sender I<nonce> in
|
H A D | SSL_alert_type_string.pod | 96 sender was unable to negotiate an acceptable set of security 153 applied, the sender decided not to proceed with negotiation.
|
H A D | SSL_CTX_set_msg_callback.pod | 110 necessarily the protocol version used by the sender of the message: If
|
/openssl/crypto/cmp/ |
H A D | cmp_hdr.c | 101 return GENERAL_NAME_set1_X509_NAME(&hdr->sender, nm); in ossl_cmp_hdr_set1_sender() 275 const X509_NAME *sender; in ossl_cmp_hdr_init() local 289 sender = ctx->cert != NULL ? X509_get_subject_name(ctx->cert) : in ossl_cmp_hdr_init() 293 if (!ossl_cmp_hdr_set1_sender(hdr, sender)) in ossl_cmp_hdr_init()
|
H A D | cmp_vfy.c | 289 "sender field", msg->header->sender->d.directoryName)) in cert_acceptable() 465 GENERAL_NAME *sender = msg->header->sender; in check_msg_find_cert() local 472 if (sender == NULL || msg->body == NULL) in check_msg_find_cert() 474 if (sender->type != GEN_DIRNAME) { in check_msg_find_cert() 516 sname = X509_NAME_oneline(sender->d.directoryName, NULL, 0); in check_msg_find_cert() 722 if (hdr->sender->type != GEN_DIRNAME) { in ossl_cmp_msg_check_update() 726 actual_sender = hdr->sender->d.directoryName; in ossl_cmp_msg_check_update()
|
H A D | cmp_protect.c | 301 if (!(ossl_cmp_general_name_is_NULL_DN(msg->header->sender) in ossl_cmp_msg_protect()
|
H A D | cmp_server.c | 598 if (hdr->sender->type != GEN_DIRNAME) { in OSSL_CMP_SRV_process_request() 602 if (!OSSL_CMP_CTX_set1_recipient(ctx, hdr->sender->d.directoryName)) in OSSL_CMP_SRV_process_request()
|
H A D | cmp_local.h | 540 GENERAL_NAME *sender; member
|
/openssl/ssl/ |
H A D | s3_enc.c | 321 size_t ssl3_final_finish_mac(SSL_CONNECTION *s, const char *sender, size_t len, in ssl3_final_finish_mac() argument 355 if (sender != NULL) { in ssl3_final_finish_mac() 360 if (EVP_DigestUpdate(ctx, sender, len) <= 0 in ssl3_final_finish_mac()
|
/openssl/providers/implementations/kem/ |
H A D | ecx_kem.c | 438 static int generate_ecxdhkm(const ECX_KEY *sender, const ECX_KEY *peer, in generate_ecxdhkm() argument 445 return ossl_ecx_compute_key((ECX_KEY *)peer, (ECX_KEY *)sender, in generate_ecxdhkm() 446 sender->keylen, out, &len, maxout); in generate_ecxdhkm()
|
H A D | ec_kem.c | 520 static int generate_ecdhkm(const EC_KEY *sender, const EC_KEY *peer, in generate_ecdhkm() argument 524 const EC_GROUP *group = EC_KEY_get0_group(sender); in generate_ecdhkm() 535 sender, NULL) > 0; in generate_ecdhkm()
|
/openssl/crypto/crmf/ |
H A D | crmf_local.h | 234 /* 0 */ GENERAL_NAME *sender; member
|
H A D | crmf_asn.c | 100 ASN1_EXP(OSSL_CRMF_POPOSIGNINGKEYINPUT_AUTHINFO, value.sender,
|
/openssl/test/smime-eml/ |
H A D | SignedInvalidMappingFromanyPolicyTest7.eml | 2 From: sender@testcertificates.gov
|
/openssl/ssl/statem/ |
H A D | statem_lib.c | 612 const char *sender; in tls_construct_finished() local 638 sender = ssl->method->ssl3_enc->server_finished_label; in tls_construct_finished() 641 sender = ssl->method->ssl3_enc->client_finished_label; in tls_construct_finished() 646 sender, slen, in tls_construct_finished() 753 const char *sender; in ssl3_take_mac() local 758 sender = ssl->method->ssl3_enc->server_finished_label; in ssl3_take_mac() 761 sender = ssl->method->ssl3_enc->client_finished_label; in ssl3_take_mac() 766 ssl->method->ssl3_enc->final_finish_mac(s, sender, slen, in ssl3_take_mac()
|
/openssl/doc/man1/ |
H A D | openssl-cmp.pod.in | 322 the subject DN is used as fallback sender of outgoing CMP messages. 403 Its subject is used as fallback sender in CMP message headers 463 Its subject is used as sender of outgoing messages if B<-cert> is not given. 643 and as default value for the expected sender of CMP responses. 647 Distinguished Name (DN) expected in the sender field of incoming CMP messages. 655 expected sender name will continue to match after updates of the server cert. 791 if no sender name can be determined from the B<-cert> or <-subject> options and 814 The subject of this certificate will be used as sender of outgoing CMP messages,
|
/openssl/include/openssl/ |
H A D | cmp.h.in | 89 * -- invalid sender nonce, either missing or wrong size 99 * -- the sender was not authorized to make the preceding
|
/openssl/doc/man7/ |
H A D | provider-kdf.pod | 218 Sets an optional random string that is provided by the sender called
|
/openssl/crypto/err/ |
H A D | openssl.txt | 258 CMP_R_MISSING_SENDER_IDENTIFICATION:111:missing sender identification 265 CMP_R_NO_SUITABLE_SENDER_CERT:145:no suitable sender cert 276 sender generalname type not supported 288 CMP_R_UNEXPECTED_SENDER:106:unexpected sender
|